]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/pnode.c
gfs2: Fix glock rhashtable rcu bug
[mirror_ubuntu-artful-kernel.git] / fs / pnode.c
CommitLineData
07b20889
RP
1/*
2 * linux/fs/pnode.c
3 *
4 * (C) Copyright IBM Corporation 2005.
5 * Released under GPL v2.
6 * Author : Ram Pai (linuxram@us.ibm.com)
7 *
8 */
6b3286ed 9#include <linux/mnt_namespace.h>
07b20889
RP
10#include <linux/mount.h>
11#include <linux/fs.h>
132c94e3 12#include <linux/nsproxy.h>
6d59e7f5 13#include "internal.h"
07b20889
RP
14#include "pnode.h"
15
03e06e68 16/* return the next shared peer mount of @p */
c937135d 17static inline struct mount *next_peer(struct mount *p)
03e06e68 18{
6776db3d 19 return list_entry(p->mnt_share.next, struct mount, mnt_share);
03e06e68
RP
20}
21
c937135d 22static inline struct mount *first_slave(struct mount *p)
5afe0022 23{
6776db3d 24 return list_entry(p->mnt_slave_list.next, struct mount, mnt_slave);
5afe0022
RP
25}
26
c937135d 27static inline struct mount *next_slave(struct mount *p)
5afe0022 28{
6776db3d 29 return list_entry(p->mnt_slave.next, struct mount, mnt_slave);
5afe0022
RP
30}
31
6fc7871f
AV
32static struct mount *get_peer_under_root(struct mount *mnt,
33 struct mnt_namespace *ns,
34 const struct path *root)
97e7e0f7 35{
6fc7871f 36 struct mount *m = mnt;
97e7e0f7
MS
37
38 do {
39 /* Check the namespace first for optimization */
143c8c91 40 if (m->mnt_ns == ns && is_path_reachable(m, m->mnt.mnt_root, root))
6fc7871f 41 return m;
97e7e0f7 42
c937135d 43 m = next_peer(m);
6fc7871f 44 } while (m != mnt);
97e7e0f7
MS
45
46 return NULL;
47}
48
49/*
50 * Get ID of closest dominating peer group having a representative
51 * under the given root.
52 *
53 * Caller must hold namespace_sem
54 */
6fc7871f 55int get_dominating_id(struct mount *mnt, const struct path *root)
97e7e0f7 56{
6fc7871f 57 struct mount *m;
97e7e0f7 58
32301920 59 for (m = mnt->mnt_master; m != NULL; m = m->mnt_master) {
143c8c91 60 struct mount *d = get_peer_under_root(m, mnt->mnt_ns, root);
97e7e0f7 61 if (d)
15169fe7 62 return d->mnt_group_id;
97e7e0f7
MS
63 }
64
65 return 0;
66}
67
6fc7871f 68static int do_make_slave(struct mount *mnt)
a58b0eb8 69{
32301920 70 struct mount *peer_mnt = mnt, *master = mnt->mnt_master;
d10e8def 71 struct mount *slave_mnt;
a58b0eb8
RP
72
73 /*
74 * slave 'mnt' to a peer mount that has the
796a6b52 75 * same root dentry. If none is available then
a58b0eb8
RP
76 * slave it to anything that is available.
77 */
c937135d 78 while ((peer_mnt = next_peer(peer_mnt)) != mnt &&
6fc7871f 79 peer_mnt->mnt.mnt_root != mnt->mnt.mnt_root) ;
a58b0eb8
RP
80
81 if (peer_mnt == mnt) {
c937135d 82 peer_mnt = next_peer(mnt);
a58b0eb8
RP
83 if (peer_mnt == mnt)
84 peer_mnt = NULL;
85 }
5d477b60
TI
86 if (mnt->mnt_group_id && IS_MNT_SHARED(mnt) &&
87 list_empty(&mnt->mnt_share))
6fc7871f 88 mnt_release_group_id(mnt);
719f5d7f 89
6776db3d 90 list_del_init(&mnt->mnt_share);
15169fe7 91 mnt->mnt_group_id = 0;
a58b0eb8
RP
92
93 if (peer_mnt)
94 master = peer_mnt;
95
96 if (master) {
6776db3d 97 list_for_each_entry(slave_mnt, &mnt->mnt_slave_list, mnt_slave)
32301920 98 slave_mnt->mnt_master = master;
6776db3d
AV
99 list_move(&mnt->mnt_slave, &master->mnt_slave_list);
100 list_splice(&mnt->mnt_slave_list, master->mnt_slave_list.prev);
101 INIT_LIST_HEAD(&mnt->mnt_slave_list);
a58b0eb8 102 } else {
6776db3d 103 struct list_head *p = &mnt->mnt_slave_list;
a58b0eb8 104 while (!list_empty(p)) {
b5e61818 105 slave_mnt = list_first_entry(p,
6776db3d
AV
106 struct mount, mnt_slave);
107 list_del_init(&slave_mnt->mnt_slave);
a58b0eb8
RP
108 slave_mnt->mnt_master = NULL;
109 }
110 }
32301920 111 mnt->mnt_master = master;
fc7be130 112 CLEAR_MNT_SHARED(mnt);
a58b0eb8
RP
113 return 0;
114}
115
99b7db7b
NP
116/*
117 * vfsmount lock must be held for write
118 */
0f0afb1d 119void change_mnt_propagation(struct mount *mnt, int type)
07b20889 120{
03e06e68 121 if (type == MS_SHARED) {
b90fa9ae 122 set_mnt_shared(mnt);
a58b0eb8
RP
123 return;
124 }
6fc7871f 125 do_make_slave(mnt);
a58b0eb8 126 if (type != MS_SLAVE) {
6776db3d 127 list_del_init(&mnt->mnt_slave);
d10e8def 128 mnt->mnt_master = NULL;
9676f0c6 129 if (type == MS_UNBINDABLE)
0f0afb1d 130 mnt->mnt.mnt_flags |= MNT_UNBINDABLE;
0b03cfb2 131 else
0f0afb1d 132 mnt->mnt.mnt_flags &= ~MNT_UNBINDABLE;
03e06e68 133 }
07b20889 134}
b90fa9ae
RP
135
136/*
137 * get the next mount in the propagation tree.
138 * @m: the mount seen last
139 * @origin: the original mount from where the tree walk initiated
796a6b52
AV
140 *
141 * Note that peer groups form contiguous segments of slave lists.
142 * We rely on that in get_source() to be able to find out if
143 * vfsmount found while iterating with propagation_next() is
144 * a peer of one we'd found earlier.
b90fa9ae 145 */
c937135d
AV
146static struct mount *propagation_next(struct mount *m,
147 struct mount *origin)
b90fa9ae 148{
5afe0022 149 /* are there any slaves of this mount? */
143c8c91 150 if (!IS_MNT_NEW(m) && !list_empty(&m->mnt_slave_list))
5afe0022
RP
151 return first_slave(m);
152
153 while (1) {
32301920 154 struct mount *master = m->mnt_master;
5afe0022 155
32301920 156 if (master == origin->mnt_master) {
c937135d
AV
157 struct mount *next = next_peer(m);
158 return (next == origin) ? NULL : next;
6776db3d 159 } else if (m->mnt_slave.next != &master->mnt_slave_list)
5afe0022
RP
160 return next_slave(m);
161
162 /* back at master */
163 m = master;
164 }
165}
166
f2ebb3a9 167static struct mount *next_group(struct mount *m, struct mount *origin)
5afe0022 168{
f2ebb3a9
AV
169 while (1) {
170 while (1) {
171 struct mount *next;
172 if (!IS_MNT_NEW(m) && !list_empty(&m->mnt_slave_list))
173 return first_slave(m);
174 next = next_peer(m);
175 if (m->mnt_group_id == origin->mnt_group_id) {
176 if (next == origin)
177 return NULL;
178 } else if (m->mnt_slave.next != &next->mnt_slave)
179 break;
180 m = next;
181 }
182 /* m is the last peer */
183 while (1) {
184 struct mount *master = m->mnt_master;
185 if (m->mnt_slave.next != &master->mnt_slave_list)
186 return next_slave(m);
187 m = next_peer(master);
188 if (master->mnt_group_id == origin->mnt_group_id)
189 break;
190 if (master->mnt_slave.next == &m->mnt_slave)
191 break;
192 m = master;
193 }
194 if (m == origin)
195 return NULL;
5afe0022 196 }
f2ebb3a9 197}
5afe0022 198
f2ebb3a9
AV
199/* all accesses are serialized by namespace_sem */
200static struct user_namespace *user_ns;
7b036fdf 201static struct mount *last_dest, *first_source, *last_source, *dest_master;
f2ebb3a9
AV
202static struct mountpoint *mp;
203static struct hlist_head *list;
204
94246b62
MP
205static inline bool peers(struct mount *m1, struct mount *m2)
206{
207 return m1->mnt_group_id == m2->mnt_group_id && m1->mnt_group_id;
208}
209
f2ebb3a9
AV
210static int propagate_one(struct mount *m)
211{
212 struct mount *child;
213 int type;
214 /* skip ones added by this propagate_mnt() */
215 if (IS_MNT_NEW(m))
216 return 0;
217 /* skip if mountpoint isn't covered by it */
218 if (!is_subdir(mp->m_dentry, m->mnt.mnt_root))
219 return 0;
94246b62 220 if (peers(m, last_dest)) {
f2ebb3a9
AV
221 type = CL_MAKE_SHARED;
222 } else {
223 struct mount *n, *p;
7b036fdf 224 bool done;
f2ebb3a9
AV
225 for (n = m; ; n = p) {
226 p = n->mnt_master;
7b036fdf 227 if (p == dest_master || IS_MNT_MARKED(p))
f2ebb3a9 228 break;
796a6b52 229 }
7b036fdf
EB
230 do {
231 struct mount *parent = last_source->mnt_parent;
232 if (last_source == first_source)
233 break;
234 done = parent->mnt_master == p;
235 if (done && peers(n, parent))
236 break;
237 last_source = last_source->mnt_master;
238 } while (!done);
239
f2ebb3a9
AV
240 type = CL_SLAVE;
241 /* beginning of peer group among the slaves? */
242 if (IS_MNT_SHARED(m))
243 type |= CL_MAKE_SHARED;
5afe0022 244 }
f2ebb3a9
AV
245
246 /* Notice when we are propagating across user namespaces */
247 if (m->mnt_ns->user_ns != user_ns)
248 type |= CL_UNPRIVILEGED;
249 child = copy_tree(last_source, last_source->mnt.mnt_root, type);
250 if (IS_ERR(child))
251 return PTR_ERR(child);
8486a788 252 child->mnt.mnt_flags &= ~MNT_LOCKED;
f2ebb3a9
AV
253 mnt_set_mountpoint(m, mp, child);
254 last_dest = m;
255 last_source = child;
256 if (m->mnt_master != dest_master) {
257 read_seqlock_excl(&mount_lock);
258 SET_MNT_MARK(m->mnt_master);
259 read_sequnlock_excl(&mount_lock);
260 }
261 hlist_add_head(&child->mnt_hash, list);
fd4b5fa6 262 return count_mounts(m->mnt_ns, child);
b90fa9ae
RP
263}
264
265/*
266 * mount 'source_mnt' under the destination 'dest_mnt' at
267 * dentry 'dest_dentry'. And propagate that mount to
268 * all the peer and slave mounts of 'dest_mnt'.
269 * Link all the new mounts into a propagation tree headed at
270 * source_mnt. Also link all the new mounts using ->mnt_list
271 * headed at source_mnt's ->mnt_list
272 *
273 * @dest_mnt: destination mount.
274 * @dest_dentry: destination dentry.
275 * @source_mnt: source mount.
276 * @tree_list : list of heads of trees to be attached.
277 */
84d17192 278int propagate_mnt(struct mount *dest_mnt, struct mountpoint *dest_mp,
38129a13 279 struct mount *source_mnt, struct hlist_head *tree_list)
b90fa9ae 280{
f2ebb3a9 281 struct mount *m, *n;
b90fa9ae 282 int ret = 0;
132c94e3 283
f2ebb3a9
AV
284 /*
285 * we don't want to bother passing tons of arguments to
286 * propagate_one(); everything is serialized by namespace_sem,
287 * so globals will do just fine.
288 */
289 user_ns = current->nsproxy->mnt_ns->user_ns;
290 last_dest = dest_mnt;
7b036fdf 291 first_source = source_mnt;
f2ebb3a9
AV
292 last_source = source_mnt;
293 mp = dest_mp;
294 list = tree_list;
295 dest_master = dest_mnt->mnt_master;
296
297 /* all peers of dest_mnt, except dest_mnt itself */
298 for (n = next_peer(dest_mnt); n != dest_mnt; n = next_peer(n)) {
299 ret = propagate_one(n);
300 if (ret)
b90fa9ae 301 goto out;
f2ebb3a9 302 }
b90fa9ae 303
f2ebb3a9
AV
304 /* all slave groups */
305 for (m = next_group(dest_mnt, dest_mnt); m;
306 m = next_group(m, dest_mnt)) {
307 /* everything in that slave group */
308 n = m;
309 do {
310 ret = propagate_one(n);
311 if (ret)
312 goto out;
313 n = next_peer(n);
314 } while (n != m);
b90fa9ae
RP
315 }
316out:
f2ebb3a9
AV
317 read_seqlock_excl(&mount_lock);
318 hlist_for_each_entry(n, tree_list, mnt_hash) {
319 m = n->mnt_parent;
320 if (m->mnt_master != dest_mnt->mnt_master)
321 CLEAR_MNT_MARK(m->mnt_master);
b90fa9ae 322 }
f2ebb3a9 323 read_sequnlock_excl(&mount_lock);
b90fa9ae
RP
324 return ret;
325}
a05964f3 326
731ac928
EB
327static struct mount *find_topper(struct mount *mnt)
328{
329 /* If there is exactly one mount covering mnt completely return it. */
330 struct mount *child;
331
332 if (!list_is_singular(&mnt->mnt_mounts))
333 return NULL;
334
335 child = list_first_entry(&mnt->mnt_mounts, struct mount, mnt_child);
336 if (child->mnt_mountpoint != mnt->mnt.mnt_root)
337 return NULL;
338
339 return child;
340}
341
a05964f3
RP
342/*
343 * return true if the refcount is greater than count
344 */
1ab59738 345static inline int do_refcount_check(struct mount *mnt, int count)
a05964f3 346{
aba809cf 347 return mnt_get_count(mnt) > count;
a05964f3
RP
348}
349
350/*
351 * check if the mount 'mnt' can be unmounted successfully.
352 * @mnt: the mount to be checked for unmount
353 * NOTE: unmounting 'mnt' would naturally propagate to all
354 * other mounts its parent propagates to.
355 * Check if any of these mounts that **do not have submounts**
356 * have more references than 'refcnt'. If so return busy.
99b7db7b 357 *
b3e19d92 358 * vfsmount lock must be held for write
a05964f3 359 */
1ab59738 360int propagate_mount_busy(struct mount *mnt, int refcnt)
a05964f3 361{
731ac928 362 struct mount *m, *child, *topper;
0714a533 363 struct mount *parent = mnt->mnt_parent;
a05964f3 364
0714a533 365 if (mnt == parent)
a05964f3
RP
366 return do_refcount_check(mnt, refcnt);
367
368 /*
369 * quickly check if the current mount can be unmounted.
370 * If not, we don't have to go checking for all other
371 * mounts
372 */
6b41d536 373 if (!list_empty(&mnt->mnt_mounts) || do_refcount_check(mnt, refcnt))
a05964f3
RP
374 return 1;
375
c937135d
AV
376 for (m = propagation_next(parent, parent); m;
377 m = propagation_next(m, parent)) {
731ac928
EB
378 int count = 1;
379 child = __lookup_mnt(&m->mnt, mnt->mnt_mountpoint);
380 if (!child)
381 continue;
382
383 /* Is there exactly one mount on the child that covers
384 * it completely whose reference should be ignored?
385 */
386 topper = find_topper(child);
387 if (topper)
388 count += 1;
389 else if (!list_empty(&child->mnt_mounts))
390 continue;
391
392 if (do_refcount_check(child, count))
393 return 1;
a05964f3 394 }
731ac928 395 return 0;
a05964f3
RP
396}
397
5d88457e
EB
398/*
399 * Clear MNT_LOCKED when it can be shown to be safe.
400 *
401 * mount_lock lock must be held for write
402 */
403void propagate_mount_unlock(struct mount *mnt)
404{
405 struct mount *parent = mnt->mnt_parent;
406 struct mount *m, *child;
407
408 BUG_ON(parent == mnt);
409
410 for (m = propagation_next(parent, parent); m;
411 m = propagation_next(m, parent)) {
731ac928 412 child = __lookup_mnt(&m->mnt, mnt->mnt_mountpoint);
5d88457e
EB
413 if (child)
414 child->mnt.mnt_flags &= ~MNT_LOCKED;
415 }
416}
417
0c56fe31
EB
418/*
419 * Mark all mounts that the MNT_LOCKED logic will allow to be unmounted.
420 */
421static void mark_umount_candidates(struct mount *mnt)
422{
423 struct mount *parent = mnt->mnt_parent;
424 struct mount *m;
425
426 BUG_ON(parent == mnt);
427
428 for (m = propagation_next(parent, parent); m;
429 m = propagation_next(m, parent)) {
731ac928 430 struct mount *child = __lookup_mnt(&m->mnt,
0c56fe31 431 mnt->mnt_mountpoint);
731ac928
EB
432 if (!child || (child->mnt.mnt_flags & MNT_UMOUNT))
433 continue;
434 if (!IS_MNT_LOCKED(child) || IS_MNT_MARKED(m)) {
0c56fe31
EB
435 SET_MNT_MARK(child);
436 }
437 }
438}
439
a05964f3
RP
440/*
441 * NOTE: unmounting 'mnt' naturally propagates to all other mounts its
442 * parent propagates to.
443 */
61ef47b1 444static void __propagate_umount(struct mount *mnt)
a05964f3 445{
0714a533 446 struct mount *parent = mnt->mnt_parent;
c937135d 447 struct mount *m;
a05964f3 448
0714a533 449 BUG_ON(parent == mnt);
a05964f3 450
c937135d
AV
451 for (m = propagation_next(parent, parent); m;
452 m = propagation_next(m, parent)) {
731ac928
EB
453 struct mount *topper;
454 struct mount *child = __lookup_mnt(&m->mnt,
474279dc 455 mnt->mnt_mountpoint);
a05964f3 456 /*
0c56fe31
EB
457 * umount the child only if the child has no children
458 * and the child is marked safe to unmount.
a05964f3 459 */
0c56fe31
EB
460 if (!child || !IS_MNT_MARKED(child))
461 continue;
462 CLEAR_MNT_MARK(child);
731ac928
EB
463
464 /* If there is exactly one mount covering all of child
465 * replace child with that mount.
466 */
467 topper = find_topper(child);
468 if (topper)
469 mnt_change_mountpoint(child->mnt_parent, child->mnt_mp,
470 topper);
471
0c56fe31 472 if (list_empty(&child->mnt_mounts)) {
88b368f2 473 list_del_init(&child->mnt_child);
590ce4bc 474 child->mnt.mnt_flags |= MNT_UMOUNT;
c003b26f 475 list_move_tail(&child->mnt_list, &mnt->mnt_list);
38129a13 476 }
a05964f3
RP
477 }
478}
479
480/*
481 * collect all mounts that receive propagation from the mount in @list,
482 * and return these additional mounts in the same list.
483 * @list: the list of mounts to be unmounted.
99b7db7b
NP
484 *
485 * vfsmount lock must be held for write
a05964f3 486 */
c003b26f 487int propagate_umount(struct list_head *list)
a05964f3 488{
61ef47b1 489 struct mount *mnt;
a05964f3 490
0c56fe31
EB
491 list_for_each_entry_reverse(mnt, list, mnt_list)
492 mark_umount_candidates(mnt);
493
c003b26f 494 list_for_each_entry(mnt, list, mnt_list)
a05964f3
RP
495 __propagate_umount(mnt);
496 return 0;
497}